{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T21:23:49Z","timestamp":1743888229486},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319766867","type":"print"},{"value":"9783319766874","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76687-4_8","type":"book-chapter","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T04:02:09Z","timestamp":1519358529000},"page":"115-123","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Vehicle Collision-Warning System Based on Multipeer Connectivity and Off-the-Shelf Smart-Devices"],"prefix":"10.1007","author":[{"given":"Bogdan","family":"Groza","sequence":"first","affiliation":[]},{"given":"Cosmin","family":"Briceag","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,24]]},"reference":[{"issue":"6","key":"8_CR1","doi-asserted-by":"crossref","first-page":"817","DOI":"10.3233\/JCS-130472","volume":"21","author":"D Basin","year":"2013","unstructured":"Basin, D., Cremers, C., Meier, S.: Provably repairing the ISO\/IEC 9798 standard for entity authentication. J. Comput. Secur. 21(6), 817\u2013846 (2013)","journal-title":"J. Comput. Secur."},{"key":"8_CR2","unstructured":"Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, San Francisco (2011)"},{"issue":"11","key":"8_CR3","doi-asserted-by":"crossref","first-page":"1518","DOI":"10.1109\/TSMC.2015.2504040","volume":"46","author":"L-W Chen","year":"2016","unstructured":"Chen, L.-W., Chou, P.-C.: BIG-CCA: Beacon-less, infrastructure-less, and GPS-less cooperative collision avoidance based on vehicular sensor networks. IEEE Trans. Syst. Man Cybern. Syst. 46(11), 1518\u20131528 (2016)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Dhondge, K., Song, S., Choi, B.-Y., Park, H.: WiFiHonk: smartphone-based beacon stuffed WiFi Car2X-communication system for vulnerable road user safety. In: 2014 IEEE 79th Vehicular Technology Conference (VTC Spring), pp. 1\u20135. IEEE (2014)","DOI":"10.1109\/VTCSpring.2014.7023146"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Joerer, S., Segata, M., Bloessl, B., Cigno, R.L., Sommer, C., Dressler, F.: To crash or not to crash: estimating its likelihood and potentials of beacon-based IVC systems. In: 2012 IEEE Vehicular Networking Conference (VNC), pp. 25\u201332. IEEE (2012)","DOI":"10.1109\/VNC.2012.6407441"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 447\u2013462. IEEE (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"8_CR7","unstructured":"Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. Black Hat, USA (2014)"},{"issue":"8","key":"8_CR8","doi-asserted-by":"crossref","first-page":"1114","DOI":"10.1109\/TCSVT.2008.927109","volume":"18","author":"BT Morris","year":"2008","unstructured":"Morris, B.T., Trivedi, M.M.: A survey of vision-based trajectory learning and analysis for surveillance. IEEE Trans. Circ. Syst. Video Technol. 18(8), 1114\u20131127 (2008)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"8_CR9","unstructured":"Sch\u00fctze, T.: Automotive security: cryptography for Car2X communication. In: Embedded World Conference, vol. 3 (2011)"},{"issue":"1","key":"8_CR10","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TITS.2016.2568920","volume":"18","author":"MS Shirazi","year":"2017","unstructured":"Shirazi, M.S., Morris, B.T.: Looking at intersections: a survey of intersection monitoring, behavior and safety analysis of recent studies. IEEE Trans. Intell. Transp. Syst. 18(1), 4\u201324 (2017)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"8_CR11","unstructured":"World Health Organization: Road traffic deaths. Technical report (2013). \nhttp:\/\/www.who.int\/gho\/road_safety\/mortality\/en\/."}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76687-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T04:05:34Z","timestamp":1519358734000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76687-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319766867","9783319766874"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76687-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}